Getting Comfortable With The Basics


1 2 3 7 Review Review By Ash The Great,

When you pay for something online, you are putting your financial and personal details at risk. No matter which form of payment you use, there is always a risk, and there is no way for you (the consumer) to know just how big or small the risk is. The sheer number of massive hacks and leaks over the last ten years is proof enough that we have no idea how safe our payment information really is. adds another layer of privacy. Every time you use your credit card, it generates a brand new set of details, and you use the new details to pay instead of your real payment details. It is like paying with a disposable credit card. allows you to generate new payment details that you can use to buy things online, and they call it, “Creating a virtual credit card.”

Google Smart Lock: Guide

Google Smart Lock: The complete guide By Jr Raphael,

Think fast: How many times a day do you pick up your phone to look at something? Unless you live in the tundra or have far more self-control than most, the answer probably falls somewhere between "quite a few" and "more than any sane person could count." Assuming you keep your device properly secured, that means you're doing an awful lot of unlocking — be it with your face, your fingerprint, or the code you tap or swipe onto your screen.

10 Important Android Settings You Should Know

10 Important Android Settings You Should Know! By Thiojoe,   VIDEO

Android is an extremely popular mobile OS, and I actually think most of you use it. So here are some important settings that you should know about if you don't already. They aren't hidden settings, so don't be surprised if you do know some. They aren't settings you should necessarily change, because most of these come down to preference.

– Android Settings You Should Change Now!

13 Android Settings You Should Change Now! by ThioJoe   VIDEO

Those default settings are no good! Here's what to change…  —  Android has a lot of default settings that might be OK for most people, but there are some that really everyone should change. These might be settings related to privacy, security, or just plain convenience.

Firefox Send, Free File Transfers

Firefox SendFree File Transfers and Sharing with End to End Encryption.

Firefox Send uses end-to-end encryption to keep your files secure from the moment you share to the moment it's opened. You choose when your file link expires, the number of downloads and the option to add a password to protect the contents further.  

Firefox Send also makes it easy to share large file sizes. You can share file sizes up to 1GB without a login. To send files up to 2.5GB, login to your Firefox account, if you don't have a Firefox account signup is free.

Firefox Send makes it easy for your recipient. They click the link you sent to download the file. They don’t need to have a Firefox account to download your file. Making the file sharing experience seamless for both parties, as quick as sending an email.

Here's the link to Firefox Send, save as a bookmark.

Note: This is a great tool for sharing event pictures and videos with other attendees. Simply upload your images, send everyone the link, as many as 100 people will have 7 days to download them. Bypasses Credit Freeze PIN Bypasses Credit Freeze PIN by

Most people who have frozen their credit files with Equifax have been issued a numeric Personal Identification Number (PIN) which is supposed to be required before a freeze can be lifted or thawed. Unfortunately, if you don’t already have an account at the credit bureau’s new myEquifax portal, it may be simple for identity thieves to lift an existing credit freeze at Equifax and bypass the PIN armed with little more than your, name, Social Security number and birthday.

How to make people sit up and use 2-factor auth:

How to make people sit up and use 2-factor auth: Show 'em a vid reusing a toothbrush to clean the toilet, then compare it to password reuse By Iain Thomson,

RSA Despite multi-factor authentication being on hand to protect online accounts and other logins from hijackings by miscreants for more than a decade now, people still aren't using it. Today, a pair of academics revealed potential reasons why there is limited uptake.

Authentication Options Explained | 2FA, MFA, and more

Your Authentication Options Explained | 2FA, MFA, and more By Leah Bachmann,

Cybercriminals are skilled lock pickers. They know the best opportunities to break through security barriers. Their motivation is simple: transform digital data into hard cash.   

Password Manager Showdown: LastPass vs. 1Password​ By Zapier,

Until a better security standard is accepted by everyone, we're stuck using usernames and passwords.

How to use password manager apps and browser add-ons in 2019

How to use password manager apps and browser add-ons in 2019 By Tom Mcnamara,

We've been telling folks for years that you need to use a password manager to really protect your bank accounts, credit cards, and other important data, in combination with app-based two-factor authentication. But while we've talked about the general importance of these critical personal data security tools and others, it's been a while since we explained how a password manager works.

Tips to Change your Password – LastPass

5 Tips to Change your Password By Leah Bachmann,

Even though weak, reused and compromised passwords are the cause behind many breaches, people continue to display pretty risky password behavior. In fact, we’ve found that 91% of people know that using the same password for multiple accounts is a security risk, but 59% admitted that they do it anyway.

Using LastPass on iOS: Tricks you Might have Missed By Leah Bachmann,

You want your phone with you everywhere. Don’t you feel the same way about your passwords? With the LastPass iOS and Android apps you have access to all your passwords wherever you go.  

Using LastPass on Android: Tricks you Might have Missed By Leah Bachmann,

We carry our phones with us everywhere, so it’s important our favorite apps are available on-the-go. LastPass offers a great app for both Android and iOS users that lets you access all your passwords and other essential information wherever you need it.  

Password Fatigue and LastPass​ By Joe Siegrist,

John Kelly of the Washington Post had an amusing article today about how much trouble it is to create a new password every 90 days:  So Many Passwords, So Little Time By John Kelly

How can I protect myself from identity theft?

The Tech Guy airs every weekend in over 170 cities in the US and Canada and on America’s Talk XM Channel 244

How can I protect myself from identity theft?

Watch Mara from Los Angeles, CA

Mara was a victim of identity theft, and just narrowly avoided having her brokerage account drained. Leo says that Mara should change her password and turn on 2 factor authentication right away. Leo suspects the bad guys got her information from a database breach like the Collection #1 or the Marriott hack. Leo also suggests going to and see if her passwords have been compromised and are known. Leo also recommends having a credit freeze put on Mara's account using Equifax, Experian, and TransUnion. That will prevent any additional credit accounts being opened in her name.

Check out Clark Howard's article on how to put a freeze on your credit.

One Gmail Setting You Should Activate Now

Here's the One Gmail Setting You Should Activate Now By Marshall Honorof,

Gmail has more than one billion users, and there's a very good chance that you're among them. With Google Photos, Google Drive, Google Docs and a myriad of other productivity services, Google's popularity and reach are nearly unparalleled, particularly if you also use the company's Android operating system on your mobile device.

Here’s the worst mistake people make that compromises their online security

Here’s the worst mistake people make that compromises their online security By Kari Paul,

Amazon AMZN, +2.20%  founder and Chief Executive Jeff Bezos accused the National Enquirer of politically motivated blackmail late Thursday, and published a threatening email from an executive at the supermarket tabloid’s parent company. One of the many lessons from that controversy is don’t take photos that might compromise your privacy and, if you do, don’t send them via text message or email to another party. Many people would refrain from doing so.

Five reasons why you need a password manager

Forgot password? Five reasons why you need a password manager By Ed Bott,

For years, I've been reading predictions about new technologies that will render passwords obsolete. Then I click through and inspect the details and I wind up shaking my head. There are plenty of clever identity technologies working their way into the mainstream, but passwords will remain a necessary evil for many years to come.

Google’s New Chrome Extension Alerts You If Your Passwords Have Been Leaked

Google’s New Chrome Extension Alerts You If Your Passwords Have Been Leaked By Cameron Summerson,

We’ve reached a point where new data breaches are announced on what seems like a weekly basis. It’s almost impossible to keep up with all the breaches and your password situation, but a new Chrome extension from Google is here to help.

Chrome’s hidden lookalike detection feature battles URL imposters

Chrome’s hidden lookalike detection feature battles URL imposters By Danny Bradbury,

Most of us have suffered from fat-fingered browsing before, mistyping website URLs and getting taken to the wrong place. Some of us have fallen victim to hyperlinks that look like legitimate websites at first glance but which are deliberately misspelled. Now, Chrome will try to save us from lookalike sites by detecting them and flagging up a warning.

Two-factor authentication: Why do I need it?

Two-factor authentication: Why do I need it? What are the best apps? – By Bradley Chambers,

Security on the internet has become more important with each passing year. It seems like every other month there is a major data breach from major retailers or online properties. One of the key things that you can do to minimize the effect these breaches will have on you is to set up and use two-factor (or multi-factor) authentication. 

– Voicemail Phishing Campaign

Voicemail Phishing Campaign Tricks You Into Verifying Password – By Lawrence Abrams,

A new phishing campaign is underway that utilizes EML attachments that pretend to be a received voicemail and prompts you to login to retrieve it. This campaign also uses a clever tactic of tricking you into entering your password twice in order to confirm that you are providing the correct account credentials.

Want to Stay Safe Online? Use Two-Factor Authentication.

Want to Stay Safe Online? Use Two-Factor Authentication. Here's How – By Patrick Lucas Austin,

The massive and numerous data breaches over the last few years prove at least one thing: Passwords alone can’t protect you. And as if to remind you that 2019 will be just as fraught with cybersecurity issues as the year before, security researcher Troy Hunt discovered yet another major breach, ominously titled “Collection #1,” in which nearly 773 million email addresses and 21 million passwords were exposed.

Audit Extensions You’ve Installed

It’s Time to Audit All the Extensions You've Installed on Your Browser – By David Nield,

A lot of what we do on our computers goes through the browser, and that means any extensions you choose to add on top of that browser have a very privileged position: They can see where you’re going online, they can see the data you’re passing to and from the web, and they can send and receive data themselves.

Can Anyone Really Track My Phone’s Precise Location?

Can Anyone Really Track My Phone’s Precise Location? – By Chris Hoffman,

Lewis Tse Pui Lung/ by: Lewis Tse Pui Lung/

It’s the year 2019, and everyone willingly carries a tracking device in their pockets. People can have their precise locations tracked in real time by the government, advertising companies, and even rogue bounty hunters. It sounds like dystopian fiction—but it’s a reality.

Over 1 Billion Login Credentials Leaked, Here’s How to See if You Were Compromised

Over 1 Billion Login Credentials Leaked, Here’s How to See if You Were Compromised – By Cameron Summerson,

Maxim Apryatin/Shutterstock.comPhoto by: Maxim Apryatin/

Good morning! A whole slew of usernames and plaintext passwords were leaked for a number of different sites—at 772 million and 21 million respectively, it’s the largest data leak in history. Here’s how to make sure your information is still safe.

The 15-minute Chromebook tune-up

The 15-minute Chromebook tune-up – By Jr Raphael,

As far as computers go, Chromebooks are almost shockingly low-maintenance. Google's Chrome OS operating system updates itself silently and automatically — as do most of the core apps associated with the platform — and it doesn't get gunked up and slowed down over time, as traditional operating systems tend to do. There's no antivirus software to fret over, either, and little in the way of complicated settings or compatibility concerns. 

New Flag Enables Powerful Feature For Chromebook Files App – By Robby Payne,

If you are a user who’s made the transition to Chromebooks from a more standard OS like Mac OS or Windows, file management could be a little different for you.

9 Most Useful Chrome Browser Extensions – By Natasha Stokes,

Using Chrome? One of the greatest features of Google’s nimble, speedy browser is the sheer volume of free extensions available from the Chrome store. These extensions are essentially software add-ons that enhance the browser’s performance, tacking on extra capabilities to what you can do within its confines.

Want stronger passwords? Understand these 4 common password security myths

Want stronger passwords? Understand these 4 common password security myths – By Fahmida Y. Rashid,

Talking about password security is a guaranteed crowd-snoozer, a surefire way to make people shut down and tune out, but the reality is that passwords are still important. Email or social media, online banking or gaming, educational applications or online services—anything that keeps some kind of user data still depends on passwords to keep miscreants out. Attackers will continue merrily looting bank accounts and taking over online services if users don’t step up and use better passwords.

YubiKey 5 NFC security key review

YubiKey 5 NFC security key review – By Liz Rodriguez,

REVIEW – In a previous YubiKey review, I mentioned how we now live in a world where many websites are being compromised. Along with mobile authenticator apps available, using a hardware device such as the YubiKey is great for extra login security. I had the opportunity to take a look at the newest of Yubico’s hardware keys; the YubiKey 5 NFC. Let’s take a look!


Google’s Public DNS works with Android 9 Pie

Google's Public DNS now works with Android 9 Pie – By Corbin Davenport,

A Domain Name System, or DNS for short, is the component of your network connection that looks up the server IPs after you enter a domain name (e.g. Most people use the default DNS services from their ISPs/carriers, but alternatives have existed for years, like Google Public DNS. Google announced today that its DNS service finally supports DNS-over-TLS, meaning it can be set as the system-wide DNS provider on Android 9 Pie. 

Configure your network settings to use Google Public DNS by

When you use Google Public DNS, you are changing your DNS "switchboard" operator from your ISP to Google Public DNS.

1 2 3 7
Tech News by Topic